Skip to content

Avoid rate limiting non-SSL startup probes#564

Merged
EDsCODE merged 1 commit into
mainfrom
fix/controlplane-ssl-ratelimit
May 18, 2026
Merged

Avoid rate limiting non-SSL startup probes#564
EDsCODE merged 1 commit into
mainfrom
fix/controlplane-ssl-ratelimit

Conversation

@EDsCODE
Copy link
Copy Markdown
Contributor

@EDsCODE EDsCODE commented May 18, 2026

Summary

  • Stop counting control-plane non-SSL startup rejections as failed auth attempts
  • Add regression coverage proving sslmode=disable-style startup packets do not ban the observed remote address

Context

Public NLB traffic can present shared VPC-side remote IPs to Duckgres. Non-SSL probes were being counted against the same per-IP auth limiter, so enough probes could ban valid TLS/auth clients routed through the same observed address.

Test

  • go test ./controlplane

@EDsCODE EDsCODE merged commit d656b73 into main May 18, 2026
22 checks passed
@EDsCODE EDsCODE deleted the fix/controlplane-ssl-ratelimit branch May 18, 2026 16:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant